The 4th Industrial Revolution

July 2019 Editor's Choice, Information Security, Security Services & Risk Management, Industrial (Industry)

When one thinks of the word ‘revolution’, images of armed insurgents attempting to overthrow an incumbent government or system invariably springs to mind. Adding the word ‘industrial’ changes the image to one of technological change. Today, however, the two meanings are becoming increasingly intertwined and the future vision is increasingly worrying.

Craig Rosewarne.
Craig Rosewarne.

A quick preview of preceding revolutions puts things into perspective:

First Revolution – The invention of the steam engine in 1760 powered new manufacturing processes leading to the creation of factories and industry.

Second Revolution – Mass production in new industries such as steel, oil and electricity coupled with key inventions including the telephone, light bulb and internal combustion engine.

Third Revolution – Also known as the ‘Digital Revolution’ after the introduction of the semiconductor, personal computer and Internet.

Fourth Revolution – Due to the fact that our physical, biological and digital world is shrinking rapidly due to rapid advancements in technology, a conflict of interests relating to ideology, supremacy, financial, etc. will occur. Cyber warfare is already taking place and a major attack vector are countrys’ industrial sectors. With every attack comes the need for defence, but are we ready?

Technology: good and bad

Most major industries have turned to and are reliant on technology to run their operations. This is a time of great promise, but also one of frightening peril. Cyber technology can both help save lives or cause irreparable harm and in a combination of the two, depending on whose side you’re on, both.

Some notable cases of cyberattacks against industry have included:

Stuxnet – In the early 2000s, Iran began to flex its nuclear muscle as it sought to counter the threat that Israel posed by possessing nuclear weapons. A uranium processing plant began enriching uranium at a plant supplied by America in the 1950s, when Iran was still a regional ally. The West and Israel had two options, go to war or allow Iran to complete its plan, which it claimed was for humanitarian purposes. A third proposal was then put forward, the use of cyber technology to destroy or at least delay the enrichment.

The problem was that the plant’s computer systems were air-gapped and only a few key personnel had access to them. The solution was simple, the old Greek Trojan Horse. USBs containing malicious code were left near the cars of the key scientists and sure enough, one was picked up and inserted into his laptop and then transferred to the main system.

The targets were the centrifuges (simply put, giant ‘spin driers’) rotating at 100 000 rpm which extracted purer forms of uranium. Stuxnet caused these centrifuges to speed up without showing it in the control rooms. They eventually tore themselves to pieces, delaying Iran’s plans long enough (along with sanctions) to bring them to the negotiating table.

German blast furnace – In 2014, a German steel mill’s blast furnace was hacked causing the electronic doors not to seal properly. The damage was enormous. This form of attack is known as an Advanced Persistent Threat (APT) where attackers infiltrate the system and gather information over a period of time. When weaknesses are found, they strike.

Ukrainian power grid – This is one of the first major attacks, again using a Trojan, that affected a large portion of the populace in Western Ukraine. This attack has given us a taste of the potential consequences that cyber-attacks can have on industrial sites and the roll-on affect to consumers.

We now have the Industrial Internet of Things (IIoT)

How safe is South Africa’s industrial and critical infrastructure? Sad to say, we are woefully unprepared for any major cyber incident and have thankfully not (yet) been targeted in a major attack. Koeberg, our only nuclear power station, has been around for 35 years and has suffered its fair share of shutdowns and mishaps, mostly due to human negligence and sabotage. Total estimated costs due to outages is around R 2 billion.

Our financial and retail industries have been hit fairly hard recently, but the main motivation here appears to be exfiltration of data and financial gain via ransomware attacks. Attacks against industrial targets are normally carried out by nation states, hacktivists (opposition groups, environmentalists, etc.) or even individuals with an axe to grind. With the outcry surrounding our state capture commission, people in power are turning a blind eye to a far greater threat of a major cyber incident against industrial and critical infrastructure.

What can be done to protect us? According to security group Sentryo, the approach of teams in charge of ICS cyber security must overcome five key constraints:

• Take into account physical processes*.

• Using technology specially designed for industrial environments.

• Mapping installations and analysing risks: an inventory of all material installations, critical systems and applications – this enables us to identify each weakness, the needs as well as the objectives when faced with threats.

• Placing actors, who are often unaware of the risks and thus responsible for a large part of incidents, at the heart of the security process – it is essential to promote rules of good computer hygiene, especially when it comes to access, login details or even the use of a simple USB flash drive.

• Engage actively in intelligence to stay up-to-date with the threats and vulnerabilities that are unique to the ICS sector.

o *Include skills in security and industrial process control.

o Adapt intrusion tests and security assessments for ICS in order to avoid interfering with physical processes.

o Adapt measures for detecting intrusions in order to take into account attacks that target physical processes (for example Stuxnet or CrashOverride). https://www.sentryo.net/specific-challenges-industrial-cybersecurity/)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...